Unlock instant, AI-driven research and patent intelligence for your innovation.

Security system using RSA algorithm and method thereof

a security system and algorithm technology, applied in the field of security system using, can solve the problems of inability to challenge a side channel attack that is different from the conventional hacking method, the security of personal information is compromised, and the current smart card is very susceptible to being hacked

Active Publication Date: 2005-04-14
SAMSUNG ELECTRONICS CO LTD
View PDF7 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention provides a security system and method for predicting and preventing attacks using encryption and decryption techniques. The system includes a key input section for receiving a secret key and a public key, a random coefficient generating section for generating a random coefficient, a first calculation section for dividing the secret key into two parts and performing an RSA algorithm with the public key, and a second calculation section for performing encryption and decryption using the divided keys. The system also includes a message input section for receiving a message and converting it into a binary value, and an output section for outputting either an encryption or decryption result. The method includes dividing the secret key into two parts and performing an RSA algorithm with the public key, resulting in a final encryption and decryption by adjusting the decimal point of the keys. The technical effects of the invention include improved security against attacks and efficient use of encryption and decryption techniques.

Problems solved by technology

Current smart cards, which are presently the most secure type of technology, are very susceptible of being hacked.
Such hacking of smart cards compromises the security of personal information by the extraction of personal credit information stored in the smart card and the electronic signature generating key, the forgery and the alteration of the certificate of the person himself and the electronic money based on the I.C chip, and other such abuses of personal information.
Meanwhile, although the security of the smart card is approved as a safe zone for hacking by the RSA algorithm, the smart card is not approved as a method to challenge a side channel attack that is different from the conventional hacking method.
In this case, the processing burden is increased approximately twice.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system using RSA algorithm and method thereof
  • Security system using RSA algorithm and method thereof
  • Security system using RSA algorithm and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. The embodiments are described below to explain the present invention by referring to the figures.

FIG. 3 is a block diagram illustrating the construction of a security system according to an aspect of the invention. As shown in FIG. 3, the security system includes a message input section 200, a key input section 300, and a control section 100. The control section 100 includes a random coefficient generating section 110, a first calculation section 120, a second calculation section 130, and a output section 140.

As described above, in the RSA algorithm, there are two encryption methods, a first method of transmitting a message by using a secret key and checking the message by using a public key, and a second method of transmitting a message by using a public key and ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.

Description

CROSS-REFERENCE TO RELATED APPLICATION This application claims the benefit of Korean Patent Application No. 2003-70103 filed Oct. 9, 2003, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference. BACKGROUND OF THE INVENTION 1. Field of the Invention The invention relates to a security system using a Rivest-Shamir-Alderman (RSA) algorithm and a method thereof, and more particularly, to a security system for preventing attacks to Distributed Password Authentication (DPA) by establishing a random coefficient in the execution of the RSA algorithm, and a method thereof. 2. Description of the Related Art Technology relating to security systems for computers and Internet networks is important with respect to electronic communication, such as e-mail service, electronic trade, and wireless communication. However, to ensure the security of electronic communication, an information safe service, such as a secrecy and a digital signature of a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F7/72H04L9/14H04L9/30
CPCG06F7/723G06F2207/7242H04L2209/08H04L9/003H04L9/302H04L9/14
Inventor JIN, WEON-ILHUH, MI-SUKJUNG, BAE-EUNIM, BUM-JINLEE, KYUNG-HEE
Owner SAMSUNG ELECTRONICS CO LTD